TY - BOOK AU - Barringer,Howard AU - Falcone,Ylies AU - Finkbeiner,Bernd AU - Havelund,Klaus AU - Lee,Insup AU - Pace,Gordon AU - Rosu,Grigore AU - Sokolsky,Oleg AU - Tillmann,Nikolai ED - SpringerLink (Online service) TI - Runtime Verification: First International Conference, RV 2010, St. Julians, Malta, November 1-4, 2010. Proceedings T2 - Lecture Notes in Computer Science, SN - 9783642166129 AV - QA76.758 U1 - 005.1 23 PY - 2010/// CY - Berlin, Heidelberg PB - Springer Berlin Heidelberg KW - Computer science KW - Software engineering KW - Computer software KW - Logic design KW - Computer Science KW - Software Engineering KW - Algorithm Analysis and Problem Complexity KW - Logics and Meanings of Programs KW - Programming Techniques KW - Programming Languages, Compilers, Interpreters KW - Mathematical Logic and Formal Languages N1 - Invited Papers -- Automatic Requirement Extraction from Test Cases -- Code Contracts for .NET: Runtime Verification and So Much More -- Visual Debugging for Stream Processing Applications -- Runtime Verification in Context: Can Optimizing Error Detection Improve Fault Diagnosis? -- Contracts for Scala -- Runtime Analysis and Instrumentation for Securing Software -- Tutorials -- Run-Time Verification of Networked Software -- Clara: Partially Evaluating Runtime Monitors at Compile Time -- You Should Better Enforce Than Verify -- Runtime Verification for the Web -- Statistical Model Checking: An Overview -- Runtime Verification with the RV System -- Regular and Short Papers -- A Meta-Aspect Protocol for Developing Dynamic Analyses -- Behavior Abstraction in Malware Analysis -- Clara: A Framework for Partially Evaluating Finite-State Runtime Monitors Ahead of Time -- Checking the Correspondence between UML Models and Implementation -- Compensation-Aware Runtime Monitoring -- Recovery Tasks: An Automated Approach to Failure Recovery -- Formally Efficient Program Instrumentation -- Interval Analysis for Concurrent Trace Programs Using Transaction Sequence Graphs -- Causality Analysis in Contract Violation -- Reducing Configurations to Monitor in a Software Product Line -- Runtime Instrumentation for Precise Flow-Sensitive Type Analysis -- Trace Recording for Embedded Systems: Lessons Learned from Five Industrial Projects -- Verification of an AFDX Infrastructure Using Simulations and Probabilities -- Copilot: A Hard Real-Time Runtime Monitor -- StealthWorks: Emulating Memory Errors -- Efficient Data Race Detection for Async-Finish Parallelism -- Run-Time Verification of Optimistic Concurrency -- Who Guards the Guardians? — Toward V&V of Health Management Software -- Aspect-Oriented Instrumentation with GCC -- Runtime Verification for Software Transactional Memories -- Optimized Temporal Monitors for SystemC -- Runtime Verification of Stochastic, Faulty Systems -- Low-Overhead Bug Fingerprinting for Fast Debugging -- Tool Demonstrations -- ESAT: A Tool for Animating Logic-Based Specifications of Evolvable Component Systems -- A Tool Which Mines Partial Execution Traces to Improve Static Analysis -- LarvaStat: Monitoring of Statistical Properties -- WS-PSC Monitor: A Tool Chain for Monitoring Temporal and Timing Properties in Composite Service Based on Property Sequence Chart N2 - This volume contains the proceedings of the 2010 Runtime Veri?cation conf- ence (RV 2010), which was held in St. Julians, Malta on November 1–4, 2010. The conference program included a mix of invited talks and peer reviewed p- sentations, tutorials, and tool demonstrations. The 2010 Runtime Veri?cation conference was a forum for researchers and industrial practitioners to present theories and tools for monitoring and anal- ing system(softwareandhardware)executions,aswell asa forumfor presenting applications of such tools to practical problems. The ?eld of runtime veri?cation is often referred to under di?erent names, including dynamic analysis, runtime analysis, and runtime monitoring, to mention a few. Runtime veri?cation can be applied during the development of a system for the purpose of program - derstanding, debugging, and testing, or it can be applied as part of a running system, for example for security or safety policy monitoring, and can furth- more be part of a fault protection framework. A number of sub-?elds of runtime veri?cation have emerged over time, such as speci?cation languages and logics for execution analysis, dynamic analysis algorithms, program instrumentation, security monitoring, fault protection, speci?cation mining, and dynamic system visualization. Runtime veri?cationhas strong connections to other ?elds of c- puter science research, such as combinations of static and dynamic analysis, aspect-oriented programming, and model-based testing. Runtime Veri?cation events started with a workshop in 2001 and continued as an annual workshop series through 2009 UR - http://148.231.10.114:2048/login?url=http://link.springer.com/book/10.1007/978-3-642-16612-9 ER -